Car maker Toyota admitted earlier today that it had suffered what appears to have been a malware attack at its facilities in Melbourne, Australia, which knocked out its website and other communications. Read more in my article on the Tripwire State of Security blog.

North Country Business Products (NCBP), a provider of point-of-sales systems, has revealed that 139 of its clients have been hit by a malware infection that stole the payment card details of consumers. Read more in my article on the Hot for Security blog.

How would *you* track someone who owed you money? What was the colossal flaw Facebook left on its website for anyone to exploit and hijack accounts? And what excuse are insurance companies giving for not paying victims of the NotPetya malware millions of dollars? All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Joe Carrigan of the Information Security Institute at Johns Hopkins University.

Attacks that can silently skim payment data as it is entered on websites have become a huge problem. Learn more about the likes of Magecart, and how to effectively combat such threats, in an upcoming free webinar.

Many have been baffled by Jay Brodsky’s legal action against Apple, including his claim that it takes between two and five minutes for him to pass the 2FA security check. But things began to fall a little more into place when you discover it’s not the first time he has sued Apple.

Graham Cluley Security News is sponsored this week by the folks at Recorded Future . Thanks to the great team there for their support! As leading companies in every industry today are undergoing digital transformation, the lines are blurring between any one organization and its partners, suppliers, vendors, and other third parties. In this new report, ESG examines how these business relationships can introduce new risks that need to be identified and managed “as if these third parties were part of the enterprise itself.”Download your copy now of “Third-Party Risk: Why Real-Time Intelligence Matters”. About Recorded Future. Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower ri.

Security researchers have demonstrated that it’s possible to remotely hijack control of popular electric scooters, forcing them to dangerously brake suddenly or accelerate. Read more in my article on the Bitdefender Box blog.

There will be many angry customers of VFEmail who will be distraught at the thought that years’ worth of irreplaceable personal and business correspondence may have been wiped out. It’s understandable that some might turn their fury towards VFEmail. But VFEmail is a victim too.

A popular browser extension has been removed by Google from the Chrome Web Store after it started spamming users with irritating pop-up advertisements. Read more in my article on the Hot for Security blog.

It’s easy to imagine the harm that could result from a hacker reading users’ private communications on a dating app. So it’s a disgrace that more don’t offer a higher level of security to help prevent accounts from being hijacked.

Apple has finally issued an updated to iOS, iOS 12.1.4, which fixes the high profile problem which allowed FaceTime callers to listen and even see you *before* you answered an incoming call. Read more in my article on the Hot for Security blog.

Google has released an optional extension for its Chrome browser that will trigger a visual warning if it determines you are using a username/password combination that it knows to be unsafe. Read more in my article on the Tripwire State of Security blog.

ManageFlitter, Statusbrew, and Crowdfire have had their access to the Twitter API revoked for allegedly helping users abuse the service, aggressively and repeatedly following an unfollowing large numbers of other accounts - a tactic frequently employed by Twitter spammers. Meanwhile, Twitter and Facebook share details of the accounts they have shut down after finding they were spreading misinformation in the run-up to the US midterm elections.

Analysts

Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run. You may also view the following:

Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format.

View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

Show or hide the record’s caption (content description).

Show actions that can be made with the search result record.

Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.